Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 11, Issue 37;   September 14, 2011: Telephonic Deceptions: I

Telephonic Deceptions: I

by

People have been deceiving each other at work since the invention of work. Nowadays, with telephones ever-present, telephonic deceptions are becoming more creative. Here's Part I of a handy guide for telephonic self-defense.
The Garden Tiger moth, Arctia caja

The Garden Tiger moth (Arctia caja). To avoid predation by bats, this moth has a furry body that absorbs sound, including the sound of the bat sonar. But this moth takes a further step: it emits clicks that jam bat sonar. In effect, the Garden Tiger moth deceives the bat by aggressive counter-measures. Its approach is analogous to the deception tactics humans use to deceive each other using telephones, in that both the moth and the human send intentionally confusing signals. Bats and moths have been engaged in this sensory "arms race" for millions of years. Humans have been engaged in telephonic deception for less than 100 years. It's reasonable to suppose that human deception tactics will eventually become far more sophisticated than they now are. View a video of bat/moth interactions.

Photo courtesy Wikimedia.

People who suddenly reach into a pocket or purse and pull out a phone to answer it might not actually be doing what they appear to be doing. Maybe they just don't want to talk to you.

According to a study entitled, "Americans and their cell phones," by Pew Research, released August 15, among U.S. adults surveyed, 13% acknowledge having used their cell phones at least once in the past 30 days to avoid interacting with someone. I suspect that percentage would have been much greater if the survey had included other motivations, such as wanting to appear to be important or busy, showing off a new high-status phone, wanting to move to a more private setting where one is less likely to be observed, or any of dozens of other motivations.

Since deceivers are not always clever enough to pull off their deceptions, you can sometimes detect the deception if you're aware of the more common mistakes they make. For example, a typical error associated with the I'm-answering-my-phone ploy described above is forgetting to disable the ring tone. Nothing looks sillier than talking into a cell phone that suddenly begins to ring. When you see this happen, it's probable that a deception was underway. And if you suspect this deception, you can test your conjecture by calling the person on your phone, if you have their number. If you hear the physical phone ring, then it wasn't engaged.

Here is Part I of a little catalog of examples of deceptions involving the telephone, and some methods for detecting them.

Circumventing personal cell phone bans
When using personal cell phones is banned at work, some use this ploy: Make the call, put the cell phone on speaker or use a blue tooth earpiece, then pick up the desk phone without making a call on it, and continue the conversation on the cell phone. They then appear to be speaking on the desk phone.
A typical mistake is to forget to warn, or fail to warn, the called party that the cell phone is on speaker.
Phone borrowers
Someone If you need an excuse to leave a
meeting early, having an actual
call come in on your phone
is usually good enough
who wants to borrow your phone to make a call might actually make a call, but they might also want to have a look at your recent calls.
Borrowers rarely forget that you can watch what they do. Lending someone your phone is not a good idea, but at least you'll know what number they called.
Faking incoming calls
If you need an excuse to leave a meeting early, having an actual call come in on your phone is usually good enough. With a scripting language like AppleScript, and a Skype account, you can easily arrange it.
Common mistake: forgetting to blank the screen and mute the sound of the computer that runs the script. Anyone passing by, with enough knowledge, can easily figure out what's happening.

We'll explore a few more tactics, and some serious security concerns, next time.  Next in this series Go to top Top  Next issue: Telephonic Deceptions: II  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenoszTuEUHmPyIVahGner@ChacDQVeCNrWwYWotpyKoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

The Rindge Dam, in Malibu Canyon, CaliforniaSnares at Work
Stuck in uncomfortable situations, we tend to think of ourselves as trapped. But sometimes it is our own actions that keep us stuck. Understanding how these traps work is the first step to learning how to deal with them.
Aggregating anemones (Anthopleura elegantissima)How Pet Projects Get Resources: Cleverness
When pet projects thrive in an organization, they sometimes depend on the clever tactics of those who nurture them to secure resources despite conflict with organizational priorities. How does this happen?
A pariah dogPariah Professions: I
In some organizations entire professions are held in low regard. Their members become pariahs to some people in the rest of the organization. When these conditions prevail, organizational performance suffers.
A rescue puppyYou Can't Control What Other People Think
Ever think that the world would be a much better place if you could control what other people think? Maybe it would be. And maybe not...
U.S. President Barack Obama and Arizona Governor Jan Brewer conferring in the Oval Office in 2010Grace Under Fire: II
When we debate at work, things sometimes turn unpleasant. Out of control, one party might maneuver the other into losing control. If we have better tools for recognizing these tactics, we're better able to maintain self-control. Here's Part II of such a toolkit.

See also Workplace Politics and Ethics at Work for more related articles.

Forthcoming issues of Point Lookout

Virginia SatirComing September 26: Congruent Decision-Making: I
Decision-makers who rely on incomplete or biased information are more likely to make faulty decisions. Congruent decision-making can limit the incidence of bad decisions. Available here and by RSS on September 26.
A hospital patientAnd on October 3: Congruent Decision-Making: II
Decision-makers who rely on incomplete or biased information are more likely to make decisions that don't fit the reality of their organizations. Here's Part II of a framework for making decisions that fit. Available here and by RSS on October 3.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrensorQayaKnwtMYOhHner@ChacgRvelNQUBddBOsIVoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

10 Non-Technical Phenomena That Lead to Technical Debt
When 10 Non-Technical Phenomena that Lead to Technical Debtorganizations set about gaining control of their accumulated and newly incurring technical debt, a common error of thinking is that the problem can be addressed by modifying their technical processes alone. That can be effective in cases in which the causes of technical debt are found only in the engineering and IT organizations. But those cases are rare. This program surveys ten examples of organizational phenomena that lead to technical debt and which are not restricted to the engineering or IT organizations. Indeed, many of these phenomena cannot be found in the engineering or IT organizations, or if found there, they have relatively small effects on technical debt. For each of the ten phenomena, we describe how it leads to technical debt formation or persistence, and what can be done to mitigate its effects. Most important, we explain how effective control of technical debt requires contributions from a broad array of organizational roles. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.